A method and apparatus are provided for handing over a mobile node from a first access router to a second access router. This may include moving a mobile node from a first geographic location associated with the first access router to a second geographic location associated with the second access router. A request message may then be sent from the second access router to the mobile node. A connectivity report may then be sent from the mobile node to the second access router.
|
29. An access router, comprising:
a processor configured to execute computer-readable instructions for performing
handing over a mobile node from another access router;
sending a request message to the mobile node; and
receiving a connectivity report from the mobile node,
wherein the receiving the connectivity report comprises receiving information about the another access router.
1. A method, comprising:
sending a request message from a second access router to a mobile node;
in response to the request message, sending a connectivity report from the mobile node to the second access router,
wherein the sending the connectivity report comprises providing the second access router with information about a first access router though the connectivity report; and
handing over the mobile node from the first access router to the second access router.
11. A method comprising:
moving a mobile node from a first geographic location associated with a first access router to a second geographic location associated with a second access router;
sending a request message from the second access router to the mobile node; and
sending a connectivity report from the mobile node to the second access router,
wherein the sending the connectivity report comprises providing the second access router with information about the first access router through the connectivity report.
20. A mobile internet protocol network, comprising:
a first access router;
a second access router coupled to the first access router; and
a mobile node,
wherein the second access router is configured to send, upon the mobile node moving to a geographic location associated with the second access router, a request message to the mobile node requesting a connectivity report, and
wherein the mobile node is configured to provide the second access router with information about the first access router though the connectivity report.
36. A mobile internet protocol network, comprising:
a first means for access routing;
a second means for access routing coupled to the first means for access routing; and
a mobile means for communicating,
wherein the second means for access routing is configured to send, upon the mobile means for communicating moving to a geographic location associated with the second means for access routing, a request message to the mobile means for communicating requesting a connectivity report, and
wherein the mobile means for communicating is configured to provide the second means for access routing with information about the first means for access routing through the connectivity report.
2. The method of
prior to the sending the request message from the second access router to the mobile node, obtaining, by the mobile node, connectivity with the second access router by moving into a geographic location associated with the second access router.
3. The method of
4. The method of
5. The method of
6. The method of
7. The method of
8. The method of
performing the handing over the mobile node from the first access router to the second access router after sending the connectivity report.
9. The method of
performing the handing over the mobile node from the first access router to the second access router before sending the connectivity report.
10. The method of
obtaining, by the mobile node, internet protocol connectivity with the second access router,
wherein the sending the request message occurs after the obtaining, by the mobile node, the internet protocol connectivity with the second access router.
12. The method of
prior to the sending the request message from the second access router to the mobile node, obtaining, by the mobile node, connectivity with the second access router.
13. The method of
14. The method of
15. The method of
16. The method of
17. The method of
performing the handing over the mobile node from the first access router to the second access router after sending the connectivity report.
18. The method of
performing the handing over the mobile node from the first access router to the second access router before sending the connectivity report.
19. The method of
obtaining, by the mobile node, internet protocol connectivity with the second access router,
wherein sending the request message occurs after the obtaining, by the mobile node, the internet protocol connectivity with the second access router.
21. The network of
22. The network of
23. The network of
24. The network of
25. The network of
26. The network of
27. The network of
28. The mobile internet protocol network of
the mobile node is configured to obtains IP-internet protocol connectivity with the second access router, and
the mobile node is configured to send the request message after the mobile node has obtained the internet connectivity with the second access router.
30. The access router of
31. The access router of
32. The access router of
33. The access router of
34. The access router of
35. The access router of
the mobile node is configured to obtain internet protocol connectivity with the access router, and
the processor is configured to perform the sending the request message after the mobile node has obtained the internet protocol connectivity with the access router.
|
This application claims priority from U.S. Provisional Application No. 60/448,101, filed Feb. 20, 2003, the subject matter of which is incorporated herein by reference.
The present disclosure relates to telecommunication networks. More particularly, the present disclosure relates to handover of a mobile node to a new access router.
Telecommunication networks for mobile devices generally allow mobile devices to move geographically by “handing off” localized communication links among transmission towers and associated base stations. For example, such networks allow Internet Protocol-enabled devices such as wireless Personal Digital Assistants (PDAs) and mobile terminals and computers to move about geographically dispersed areas while maintaining a connection to the Internet.
As is well known, mobile terminals can be served by one or more access routers (ARs) that serve terminals within a particular area. Such access routers allow the mobile terminals to access one or more networks, such as the Internet, using mobile IP protocols or other protocols. Mobile terminals may communicate using one of various access technologies, such as GPRS, Bluetooth, WLAN, or others.
Mobile IP enables a mobile node (MN) to execute IP-level handovers between access routers (ARs) that act as points of attachment to the IP network. Access point (AP) or a base station is a Layer2 device that is connected to one or more access routers (ARs) and offers a wireless connection to the mobile node. Access point may be also implemented in the same entity as access router (AR). However, the handover latency and packet loss incurred by standard Mobile IP are quite high. It is desirable to provide seamless handovers (low latency and low packet loss) between access routers (ARs). Many seamless handover solutions however make an assumption that the mobile node MN and/or the current access router (AR) have a priori knowledge of the target of the handover (i.e., the next access router or target access router). In order to provide this information to these seamless handover solutions, a methodology is desired to discover geographically adjacent routers and to collect their capabilities.
Seamless handover solutions may be vulnerable toward Denial of Service (DoS) attacks. An example of this is that a malicious MN may send false reports to the new AR thereby filling up the new AR's cache with false information. This may lead to denial of service with respect to future requests. Another example is that a malicious MN may send a wrong request that may then be stored in the cache after being resolved. Similar to the first approach, the cache may get filled up by wrong entries.
Embodiments of the present invention may provide a method of handing over a mobile node from a first access router to a second access router. This may include sending a request message from the second access router to the mobile node and in response to the received request message, sending a connectivity report from the mobile node to the second access router. Additionally, prior to sending the request message from the second access router to the mobile node, the mobile node may obtain connectivity with the second access router by moving into a geographic location associated with the second access router.
The connectivity report may include an IP address of the first access router. The connectivity report may also include a Layer2, L2 identifier of the first access router. Alternatively, the connectivity report may also include a Layer2, L2 identifier of the access point attached to the first access router.
Sending the request message may include the second access router selecting one mobile node from a plurality of mobile nodes in order to send the request message. The one mobile node may be selected randomly from the plurality of mobile nodes.
Embodiments of the present invention may also include moving a mobile node from a first geographic location associated with a first access router to a second geographic location associated with a second access router. A request message may be sent from the second access router to the mobile node and a connectivity report may be sent from the mobile node to the second access router. Handover of the mobile node from the first access router to the second access router may be performed after or before sending the connectivity report.
Other objects, advantages and salient features of the invention will become apparent from the following detailed description taken in conjunction with the annexed drawings, which disclose preferred embodiments of the invention.
A better understanding of the present invention will become apparent from the following detailed description of example embodiments and the claims when read in connection with the accompanying drawings, all forming a part of the disclosure of this invention. While the following written and illustrated disclosure focuses on disclosing example embodiments of the invention, it should be clearly understood that the same is by way of illustration and example only and that the invention is not limited thereto.
The following represents brief descriptions of the drawings in which like reference numerals represent like elements and wherein:
In the following detailed description, like reference numerals and characters may be used to designate identical, corresponding or similar components in differing figure drawings. Further, arrangements may be shown in block diagram form in order to avoid obscuring the invention, and also in view of the fact that specifics with respect to implementation of such block diagram arrangements may be highly dependent upon the platform within which the present invention is to be implemented. That is, such specifics should be well within the purview of one skilled in the art.
An important issue for the mobile networks is the ability of seamless IP-layer mobility. Seamless mobility is the ability to hand a mobile node MN over to a new access router AR with minimal service disruption. In a mobile network, the access routers may not all be known to each other. Methodologies are therefore provided so that each access router AR may obtain information about other access routers. Discovering neighboring access routers within the access router's proximity allows seamless handovers in IP based mobile networks.
Embodiments of the present invention may provide a methodology of providing handover of a mobile node from a first access router associated with a first geographic location to a second access router associated with a second geographic location. A request message may be sent from the second access router to the mobile node MN once the mobile node MN has connectivity with the second (or new) access router. In response, the mobile node MN may send a connectivity report from the mobile node to the second access router.
A second service area SA2 is served by a separate base station BS2, which is in turn connected to a different access router AR2. Due to the network topology, access routers AR1 and AR2 use different blocks of IP addresses for communicating with mobile nodes roaming within their associated service areas. If the mobile node MN moves from the service area SA1 to the service area SA2, a mechanism hands off the Internet connection from the access router AR1 to the access router AR2. Similarly, if the service areas SA1 and SA2 are separated by a large logical distance (e.g., AR1 and AR2 are connected to different ISPs), a coordination mechanism permits data transmitted to a terminal previously operating in the service area SA1 to be forwarded to the service area SA2 if the mobile node moves into the service area SA2.
If the mobile node MN moves to a different service area SA2 served by a different access router AR2, then packets that were previously transmitted to access router AR1 will no longer reach the mobile node MN. One methodology is to advertise (e.g., broadcast) the existence of the access router AR2 in the service area SA2, such that when the mobile node MN moves into the service area SA2, the mobile node MN is notified of the existence of the access router AR2, and the mobile node MN receives a new IP address for communicating within the service area SA2. The mobile node MN or access router AR2 then sends a binding update to home agent AR1 so that home agent (i.e., the access router AR1) knows the IP address that will allow packets to reach the mobile node MN in the service area SA2. The home agent treats this address as a “care of” address, and all further packets to the original IP address are forwarded to the new IP address. In essence, two separate IP addresses may be used to communicate with the mobile node MN: a home agent address and a care of address that changes at each new point of attachment. This methodology is described in the Internet Engineering Task Force (IETF) Request for Comments (RFC) number 2002 (October 1996), the subject matter of which is incorporated herein by reference.
The above-described methodology assumes that the target access router (AR2) is known by the originating access router (AR1) prior to the handoff (e.g., the mobile node MN has accepted the advertisement from access router AR2 and is assigned an IP address for communicating with it). This is not always the case. Mobile nodes and access routers may therefore perform a candidate access-router discovery protocol. At least one example of Candidate Access Router Discovery is described in International Publication No. WO 03/003639 A2 to Chaskar et al., the subject matter of which is incorporated herein by reference. Candidate access-router discovery protocol may provide a reverse mapping from an access point (AP) layer-2 (L2) identifiers to IP addresses of supporting access routers. The protocol may also identify physically neighboring access routers sufficiently in advance of mobile node handover such that the access router capabilities may be exchanged. Additionally, this protocol may use these collected capabilities in addition to information provided by the mobile node, such as reachability and preferences, to aid the mobile node in selecting a target access router at or near the time of handover.
In order for an access router AR to be considered as a candidate for handover (i.e., a candidate AR), a coverage area of one or more of its attached access points overlaps with a coverage area of the mobile nodes MN's existing point of attachment. Two access routers ARs with overlapping coverage areas are considered to be geographically adjacent, or physical neighbors. Geographically adjacent routers may be separated by any number of IP hops, and may actually be in completely different domains. It is therefore important that geographically adjacent routers discover each others existence.
Geographically adjacent routers may be identified by the handover patterns of the mobile nodes. If a mobile node MN can handover between two access points, then the associated ARs may be considered as candidates for future handovers.
One methodology to obtain information regarding other access routers assumes that the mobile node MN sends connectivity reports to the new access router after obtaining the IP-level connectivity with the new access router. “Protocol for Candidate Access Router Discovery for Seamless IP-level Handovers”, Work In Progress, Internet Draft, November 2001, by Trossen et al., the subject matter of which is incorporated herein by reference, describes one such methodology. The connectivity report may include information about the old access router and related information such as Layer2 identifier of the old access router. Another methodology relies on a central server that resolves Layer2 identifier to Layer3 identifiers (such as IP addresses). “Geographically Adjacent Access Router Discovery Protocol”, Work In Progress, Internet Draft, November 2001, by Funato et al., the subject mater of which is incorporated herein by reference, describes one such methodology. These above-described methodologies may be vulnerable towards Denial of Service (DoS) attacks. More specifically, a malicious mobile node MN may send a false report to the new access router filling up the new access router's cache with false information. This may lead to denial of service with respect to future requests. The cache may therefore contain false information that cannot be used for resolving Layer2 identifiers to IP addresses. Additionally, a malicious mobile node MN may send a wrong Layer2 to Layer3 resolve request, which may then be stored in the cache after being resolved by a central server. The cache may similarly be filled up by wrong entries. The connectivity reports are sent based on unsolicited messages from the mobile node MN to the new access router. Due to the unsolicited nature of this messaging, a Denial of Service attack may be possible.
Embodiments of the present invention may provide a solution for Denial of Service attacks by having a new access router (associated with a new geographic location) send a request for a connectivity report from a particular mobile node after making connection. The new access router may also further implement certain selection policies to determine the particular mobile node (from a plurality of mobile nodes) before sending the request. This may help reduce the possibility of false entries in the local cache.
Embodiments of the present invention may implement connectivity reports through requests from the new access router to the mobile node MN. These connectivity reports may contain an IP address of the old access router and an L2 identifier of the old access point. More specifically, the new access router may send a message to the mobile node MN after the mobile node obtained IP-level connectivity with the new access router. As a response, the mobile node MN may send the new access router a message with the connectivity report information.
As shown in
Embodiments of the present invention may further implement selection policies for issuing the requests for connectivity reports. For example, the new access router may randomly choose a particular mobile node MN out of N mobile nodes to request the report. That is, the new access router may randomly pick a number n between 1 and N and wait for n mobile nodes to obtain connectivity with the new access router. The new access router may then request the connectivity report from the nth mobile node that obtained IP-level connectivity. The number N may depend, for example, on one or more of the following: (1) the strength of mobile node authentication; (2) the desire of the access router to react upon possible changes in physical topology; and (3) the size of the internal cache. For example, in a cellular system with fairly strong authentication (e.g. through a SIM card), the access router may request the reports from all or at least many (i.e., small N) mobile nodes. Additionally, if the access routers are physically added or removed from the network, the operator of the new access router may have the desire to obtain knowledge about these changes more or less fast (i.e., a small N may mean to obtain this knowledge faster than for larger Ns). The size of the internal cache may also be used as a factor since the connectivity reports are stored internally in a cache, and the new access router may increase N when the internal cache exceeds certain thresholds.
Embodiments of the present invention therefore drastically reduce the possibility for Denial of Service attacks in a candidate access router discovery process. Rather than enabling any mobile node MN to inject false connectivity reports into the access router, the new access router may select the mobile node to send the connectivity report. The selection may also depend on operator-specific policies.
Embodiments of the present invention are applicable to handoff (or handover) of the mobile node occurring prior to the connectivity report being sent. In other words, the mobile node may obtain connectivity with a new (or second) access router prior to the connectivity report being sent to the new (or second) access router. Embodiments of the present invention are also applicable to the connectivity report being sent prior to handoff (or handover) of the mobile node. In this situation, the mobile node may have connectivity with the mobile node and send the connectivity report prior to actual handoff of the mobile node.
The term “mobile node” should be understood to include, for example, IP-enabled cellular telephones, wirelessly accessible Personal Digital Assistants (PDAs); notebook computers that can communicate wirelessly; and other mobile devices that can communicate using communications over various transmission technologies (including CDMA, WCDMA, GSM, TDMA and other) or media (radio, infrared, laser, and the like).
The term “access router” should be understood to include computer-implemented devices that route packets, such as IP packets, to addresses in a network based on routing information. Access routers may be distinct from base stations/access points, which may rely on different transmission schemes to transmit information (e.g., GSM or CDMA). One or more base stations may be associated with a single access router. Alternatively, more than one access router may be associated with a single base station.
Any reference in this specification to “one embodiment”, “an embodiment”, “example embodiment”, etc., means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with any embodiment or component, it is submitted that it is within the purview of one skilled in the art to effect such feature, structure, or characteristic in connection with other ones of the embodiments and/or components. Furthermore, for ease of understanding, certain method procedures may have been delineated as separate procedures; however, these separately delineated procedures should not be construed as necessarily order dependent in their performance, i.e., some procedures may be able to be performed in an alternative ordering, simultaneously, etc.
Although the present invention has been described with reference to a number of illustrative embodiments thereof, it should be understood that numerous other modifications and embodiments can be devised by those skilled in the art that will fall within the spirit and scope of the principles of this invention. More particularly, reasonable variations and modifications are possible in the component parts and/or arrangements of the subject combination arrangement within the scope of the foregoing disclosure, the drawings and the appended claims without departing from the spirit of the invention. In addition to variations and modifications in the component parts and/or arrangements, alternative uses will also be apparent to those skilled in the art.
Patent | Priority | Assignee | Title |
7477620, | Feb 16 2004 | Samsung Electronics Co., Ltd. | Managing network information in access routers (ARs) |
7515561, | Nov 12 2002 | Nokia Technologies Oy | System and method for discovering network interface capabilities |
7643411, | Mar 06 2006 | Cisco Technology, Inc | Network-triggered quality of service (QoS) reservation |
7715562, | Mar 06 2006 | Cisco Technology, Inc.; Cisco Technology, Inc | System and method for access authentication in a mobile wireless network |
7805127, | Mar 06 2006 | Cisco Technology, Inc.; Cisco Technology, Inc | System and method for generating a unified accounting record for a communication session |
7894383, | Nov 04 2004 | Panasonic Corporation | Multi-interface communication device, terminal, and path switching method |
7912035, | Mar 06 2006 | Cisco Technology, Inc | Communicating packets using a home anchored bearer path or a visited anchored bearer path |
7929966, | Mar 06 2006 | Cisco Technology, Inc | Access terminal for communicating packets using a home anchored bearer path or a visited anchored bearer path |
7936722, | Mar 06 2006 | Cisco Technology, Inc | System and method for handover of an access terminal in a communication network |
7940722, | Mar 06 2006 | Cisco Technology, Inc.; Cisco Technology, Inc | System and method for determining a network for processing applications for a communication session |
7944875, | Mar 06 2006 | Cisco Technology, Inc | Enforcement of user level policies from visited networks in a mobile IP environment |
7962123, | Mar 06 2006 | Cisco Technology, Inc | Authentication of access terminals in a cellular communication network |
7966018, | Oct 11 2002 | Intellectual Ventures I LLC | Transport efficiency optimization for mobile IPV6 |
7966645, | Mar 06 2006 | Cisco Technology, Inc | Application-aware policy enforcement |
7991385, | Mar 06 2006 | Cisco Technology, Inc. | System and method for network charging using policy peering |
7995990, | Mar 06 2006 | Cisco Technology, Inc.; Cisco Technology, Inc | System and method for consolidating accounting data for a communication session |
8040862, | Mar 06 2006 | Cisco Technology, Inc. | System and method for providing emergency services in a visited communications environment |
8041022, | Mar 06 2006 | Cisco Technology, Inc | Policy-based control of content intercept |
8045959, | Mar 06 2006 | Cisco Technology, Inc | Assigning a serving-CSCF during access authentication |
8050391, | Mar 06 2006 | Cisco Technology, Inc.; Cisco Technology, Inc | System and method for capturing accounting data for a communication session |
8160579, | Mar 06 2006 | Cisco Technology, Inc | Performing deep packet inspection for a communication session |
8295242, | Mar 06 2006 | Cisco Technology, Inc. | System and method for exchanging policy information in a roaming communications environment |
8438613, | Mar 06 2006 | Cisco Technology, Inc | Establishing facets of a policy for a communication session |
8488486, | Nov 04 2004 | Panasonic Corporation | Multi-interface communication device, terminal, and path switching method |
8510449, | Apr 29 2005 | NETWORK APPLIANCE, NC | Caching of data requests in session-based environment |
8611926, | Sep 19 2003 | Trimble Navigation Limited | Method and a system for communicating information to a land surveying rover located in an area without cellular coverage |
8639434, | May 31 2011 | Trimble Navigation Limited | Collaborative sharing workgroup |
8719895, | Mar 06 2006 | Cisco Technology, Inc | Determining a policy output for a communication session |
8804712, | Jun 28 2001 | Nokia Technologies Oy | Determining target access routers for handover |
8818721, | May 31 2011 | Trimble Navigation Limited | Method and system for exchanging data |
Patent | Priority | Assignee | Title |
20010044305, | |||
20020068570, | |||
20020097719, | |||
20020122432, | |||
20020191627, | |||
20030091021, | |||
20030210674, | |||
20040092264, | |||
20040203783, | |||
WO3003639, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Sep 25 2003 | Nokia Corporation | (assignment on the face of the patent) | / | |||
Mar 05 2004 | TROSSEN, DIRK | Nokia Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 015124 | /0030 |
Date | Maintenance Fee Events |
Oct 11 2010 | REM: Maintenance Fee Reminder Mailed. |
Mar 06 2011 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Mar 06 2010 | 4 years fee payment window open |
Sep 06 2010 | 6 months grace period start (w surcharge) |
Mar 06 2011 | patent expiry (for year 4) |
Mar 06 2013 | 2 years to revive unintentionally abandoned end. (for year 4) |
Mar 06 2014 | 8 years fee payment window open |
Sep 06 2014 | 6 months grace period start (w surcharge) |
Mar 06 2015 | patent expiry (for year 8) |
Mar 06 2017 | 2 years to revive unintentionally abandoned end. (for year 8) |
Mar 06 2018 | 12 years fee payment window open |
Sep 06 2018 | 6 months grace period start (w surcharge) |
Mar 06 2019 | patent expiry (for year 12) |
Mar 06 2021 | 2 years to revive unintentionally abandoned end. (for year 12) |